Wired Intelligent Edge

 View Only
Expand all | Collapse all

Problem with LACP between two Switches...

This thread has been viewed 1 times
  • 1.  Problem with LACP between two Switches...

    Posted Sep 17, 2018 06:28 AM

    We have a 5 Stack-Switches (Aruba 2930M) where all connections are centralized (even if don't do routing). In the other side a couple of Aruba-2930F. Check the picture to see the ports connection:Scenario.jpg

    Here the configurations:

    Stack Aruba 2930M:

    ***********************

    trunk 2/A3 trk11 lacp

    trunk 4/A3 trk12 lacp

    spanning-tree Trk11 priority 4

    spanning-tree Trk12 priority 4

    spanning-tree mode rapid-pvst

    spanning-tree priority 4

     

    Aruba-2930F (A/B):

    ***********************

    trunk 49-50 trk1 lacp
    trunk 51-52 trk2 lacp

    spanning-tree Trk1 priority 4
    spanning-tree Trk2 priority 5
    spanning-tree mode rapid-pvst
    spanning-tree priority 6

     

    As you can see both Aruba-2930F are connected to Aruba 2930M by the port 50 and they are UP AND RUNNING. When we disconnect one of those ports 50, what I hope is that port 52 is activated, but this doesn't happen ... Since it is still blocked by LACP ...

    Any idea?

    Many thanks in advance.

     

     

     



  • 2.  RE: Problem with LACP between two Switches...

    Posted Sep 17, 2018 08:40 AM

    Hello

    Can i ask first why you are using trunks with LACP, only for 1 port? The purpose of trunks is to bundle multiple ports together as 1 logical link.

    Then can you execute following show command on all the switches: show spanning-tree. Because normally their should be already blocked port somewhere. If we see a blocked port, we know spanning-tree is well configured.

    Also if you don't like to work with spanning-tree, you can try to stack those 2 2930F switches with VSF.

     

     

     

     



  • 3.  RE: Problem with LACP between two Switches...

    Posted Sep 17, 2018 09:10 AM

    Hi HP-Browniee... Thanx 4 answer,,,,

    about "LACP only for 1 port" It's something momentary. In the future there will be redundant connections, both in TRK1 and in TRK2.


    About the "show spanning-tree" command in both 2930F's Switches it's the same:

    XXXXXXX_2# sh spanning-tree

     Spanning Tree Information

      STP Enabled          [No] : Yes                                     
      Mode                      : RPVST               
      Extended System ID        : Enabled             
      Ignore PVID Inconsistency : Disabled            
      RPVST Enabled VLANs       : 1,10,21,25,70,80,90,200,410,420,430,3150                                                                                     
                                                                               
      Switch MAC Address        : ecebb8-35c640                           
      Root Guard Ports          :
      Loop Guard Ports          :
      TCN Guard Ports           :
      BPDU Protected Ports      : 1-43                                        
      BPDU Filtered Ports       :                                         
      Auto Edge Ports           : 1-48,Trk1-Trk2                                        
      Admin Edge Ports          :                                         

      VLAN  Root Mac        Root       Root       Root                 Hello    
      ID    Address         Priority   Path-Cost  Port                 Time(sec)
      ----- --------------- ---------- ---------- -------------------- ---------
      1     f40343-6c3040   28,672     6000       Trk1                 2        
      10    20677c-758462   32,768     4000       Trk1                 2        
      21    20677c-758462   32,768     4000       Trk1                 2        
      25    20677c-758462   32,768     4000       Trk1                 2        
      70    20677c-758462   32,768     4000       Trk1                 2        
      80    20677c-758462   32,768     4000       Trk1                 2        
      90    20677c-758462   32,768     4000       Trk1                 2        
      200   20677c-758462   32,768     4000       Trk1                 2        
      410   20677c-758462   32,768     4000       Trk1                 2        
      420   20677c-758462   32,768     4000       Trk1                 2        
      430   20677c-758462   32,768     4000       Trk1                 2        
      3150  20677c-758462   32,768     4000       Trk1                 2      


    And here the TRK's configuration:

    XXXXXXXXXXXXX_2# sh running-config interface trk1

    Running configuration:

    interface Trk1
       qos trust dscp
       tagged vlan 10,21,25,70,80,90,200,410,420,430,3150
       untagged vlan 1
       spanning-tree priority 4
       exit

    XXXXXXXXXXXXX_2# sh running-config interface trk2

    Running configuration:

    interface Trk2
       tagged vlan 10,21,25,70,80,90,200,410,420,430,3150
       untagged vlan 1
       spanning-tree priority 5
       exit

    And here a STP configuration in a VLAN:


    Servicios_Sociales_2# sh spanning-tree vlan 10

     Spanning Tree Information

      STP Enabled              [No] : Yes
      Mode                          : RPVST               
      Extended System ID            : Enabled             
      Ignore PVID Inconsistency     : Disabled            
      Switch MAC Address            : ecebb8-35c640    


      VLAN ID                       : 10   
      RPVST Enabled                 : Enabled             


      Root MAC Address              : 20677c-758462       
      Root Priority                 : 32,768              
      Root Path Cost                : 4000                
      Root Port                     : Trk1                
      Operational Hello Time (secs) : 2                   
      Topology Change Count         : 6                   
      Time Since Last Change        : 4 hours             


      Root Inconsistent Ports       :                                         
      Loop Inconsistent Ports       :                                         
      PVID Inconsistent Ports       :                                         

                                                                 Designated      
      Port  Type       Cost      Priority  Role       State      Bridge          
      ----- ---------- --------- --------- ---------- ---------- -----------------
      Trk1             2000      64        Root       Forwarding d06726-90aac9    
      Trk2             0         64        Disabled   Disabled          

    And obviously the 52/Trk2 is being blocking:
     
    XXXXXXXXXX_2# sh log | i 52
    I 09/17/18 12:12:02 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:02 00076 ports: port 52 in Trk2 is now on-line
    I 09/17/18 12:12:03 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:12:16 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:17 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:12:42 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:42 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:15:32 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:15:32 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:26:21 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:26:21 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:29:25 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:29:26 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:34:09 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:34:09 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:41:07 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:41:07 00077 ports: port 52 in Trk2 is now off-line
    XXXXXXXXXX_2# sh time      

    As I said before ... Currently both switches work by TRK1 (connected by port 50). Now, what I want to achieve is that when one of those ports 50 falls, the TRK2 (port 52) is lifted. But I can not make it work ... What am I doing wrong?   
     
     
     
     
     
     
     
    Thanks a lot in advance.      
     
     
     
     
     


  • 4.  RE: Problem with LACP between two Switches...

    Posted Sep 17, 2018 09:32 AM

    What happens when you disable LACP on those ports?

    int 52
    no lacp

    Is it possible to show the full config of your switches? show run



  • 5.  RE: Problem with LACP between two Switches...

    Posted Sep 17, 2018 09:51 AM

    I'm not in the same place as the Switches ... I'm 600 kilometers away and in the case that the "NO LACP"command  leaves me out of the Switches I would be in trouble LOL

    The configurations of SW1 and SW2 are identical (except the IPs ;)):. Both configs are here:

    ; JL256A Configuration Editor; Created on release #WC.16.05.0007
    ; Ver #12:08.1d.9b.3f.bf.bb.ef.7c.59.fc.6b.fb.9f.fc.ff.ff.37.ef:ba
    hostname "Servicios_Sociales_2"
    module 1 type jl256a
    console baud-rate 9600
    console idle-timeout 600
    console idle-timeout serial-usb 600
    console max-sessions 5
    trunk 49-50 trk1 lacp
    trunk 51-52 trk2 lacp
    mac-age-time 60
    no port-security 1 eavesdrop-prevention
    port-security 1 learn-mode limited-continuous
    port-security 1 address-limit 3
    port-security 1 action send-alarm
    no port-security 2 eavesdrop-prevention
    port-security 2 learn-mode limited-continuous
    port-security 2 address-limit 3
    port-security 2 action send-alarm
    no port-security 3 eavesdrop-prevention
    port-security 3 learn-mode limited-continuous
    port-security 3 address-limit 3
    port-security 3 action send-alarm
    no port-security 4 eavesdrop-prevention
    port-security 4 learn-mode limited-continuous
    port-security 4 address-limit 3
    port-security 4 action send-alarm
    no port-security 5 eavesdrop-prevention
    port-security 5 learn-mode limited-continuous
    port-security 5 address-limit 3
    port-security 5 action send-alarm
    no port-security 6 eavesdrop-prevention
    port-security 6 learn-mode limited-continuous
    port-security 6 address-limit 3
    port-security 6 action send-alarm
    no port-security 7 eavesdrop-prevention
    port-security 7 learn-mode limited-continuous
    port-security 7 address-limit 3
    port-security 7 action send-alarm
    no port-security 8 eavesdrop-prevention
    port-security 8 learn-mode limited-continuous
    port-security 8 address-limit 3
    port-security 8 action send-alarm
    no port-security 9 eavesdrop-prevention
    port-security 9 learn-mode limited-continuous
    port-security 9 address-limit 3
    port-security 9 action send-alarm
    no port-security 10 eavesdrop-prevention
    port-security 10 learn-mode limited-continuous
    port-security 10 address-limit 3
    port-security 10 action send-alarm
    no port-security 11 eavesdrop-prevention
    port-security 11 learn-mode limited-continuous
    port-security 11 address-limit 3
    port-security 11 action send-alarm
    no port-security 12 eavesdrop-prevention
    port-security 12 learn-mode limited-continuous
    port-security 12 address-limit 3
    port-security 12 action send-alarm
    no port-security 13 eavesdrop-prevention
    port-security 13 learn-mode limited-continuous
    port-security 13 address-limit 3
    port-security 13 action send-alarm
    no port-security 14 eavesdrop-prevention
    port-security 14 learn-mode limited-continuous
    port-security 14 address-limit 3
    port-security 14 action send-alarm
    no port-security 15 eavesdrop-prevention
    port-security 15 learn-mode limited-continuous
    port-security 15 address-limit 3
    port-security 15 action send-alarm
    no port-security 16 eavesdrop-prevention
    port-security 16 learn-mode limited-continuous
    port-security 16 address-limit 3
    port-security 16 action send-alarm
    no port-security 17 eavesdrop-prevention
    port-security 17 learn-mode limited-continuous
    port-security 17 address-limit 3
    port-security 17 action send-alarm
    no port-security 18 eavesdrop-prevention
    port-security 18 learn-mode limited-continuous
    port-security 18 address-limit 3
    port-security 18 action send-alarm
    no port-security 19 eavesdrop-prevention
    port-security 19 learn-mode limited-continuous
    port-security 19 address-limit 3
    port-security 19 action send-alarm
    no port-security 20 eavesdrop-prevention
    port-security 20 learn-mode limited-continuous
    port-security 20 address-limit 3
    port-security 20 action send-alarm
    no port-security 21 eavesdrop-prevention
    port-security 21 learn-mode limited-continuous
    port-security 21 address-limit 3
    port-security 21 action send-alarm
    no port-security 22 eavesdrop-prevention
    port-security 22 learn-mode limited-continuous
    port-security 22 address-limit 3
    port-security 22 action send-alarm
    no port-security 23 eavesdrop-prevention
    port-security 23 learn-mode limited-continuous
    port-security 23 address-limit 3
    port-security 23 action send-alarm
    no port-security 24 eavesdrop-prevention
    port-security 24 learn-mode limited-continuous
    port-security 24 address-limit 3
    port-security 24 action send-alarm
    no port-security 25 eavesdrop-prevention
    port-security 25 learn-mode limited-continuous
    port-security 25 address-limit 3
    port-security 25 action send-alarm
    no port-security 26 eavesdrop-prevention
    port-security 26 learn-mode limited-continuous
    port-security 26 address-limit 3
    port-security 26 action send-alarm
    no port-security 27 eavesdrop-prevention
    port-security 27 learn-mode limited-continuous
    port-security 27 address-limit 3
    port-security 27 action send-alarm
    no port-security 28 eavesdrop-prevention
    port-security 28 learn-mode limited-continuous
    port-security 28 address-limit 3
    port-security 28 action send-alarm
    no port-security 29 eavesdrop-prevention
    port-security 29 learn-mode limited-continuous
    port-security 29 address-limit 3
    port-security 29 action send-alarm
    no port-security 30 eavesdrop-prevention
    port-security 30 learn-mode limited-continuous
    port-security 30 address-limit 3
    port-security 30 action send-alarm
    no port-security 31 eavesdrop-prevention
    port-security 31 learn-mode limited-continuous
    port-security 31 address-limit 3
    port-security 31 action send-alarm
    no port-security 32 eavesdrop-prevention
    port-security 32 learn-mode limited-continuous
    port-security 32 address-limit 3
    port-security 32 action send-alarm
    no port-security 33 eavesdrop-prevention
    port-security 33 learn-mode limited-continuous
    port-security 33 address-limit 3
    port-security 33 action send-alarm
    no port-security 34 eavesdrop-prevention
    port-security 34 learn-mode limited-continuous
    port-security 34 address-limit 3
    port-security 34 action send-alarm
    no port-security 35 eavesdrop-prevention
    port-security 35 learn-mode limited-continuous
    port-security 35 address-limit 3
    port-security 35 action send-alarm
    no port-security 36 eavesdrop-prevention
    port-security 36 learn-mode limited-continuous
    port-security 36 address-limit 3
    port-security 36 action send-alarm
    no port-security 37 eavesdrop-prevention
    port-security 37 learn-mode limited-continuous
    port-security 37 address-limit 3
    port-security 37 action send-alarm
    no port-security 38 eavesdrop-prevention
    port-security 38 learn-mode limited-continuous
    port-security 38 address-limit 3
    port-security 38 action send-alarm
    no port-security 39 eavesdrop-prevention
    port-security 39 learn-mode limited-continuous
    port-security 39 address-limit 3
    port-security 39 action send-alarm
    no port-security 40 eavesdrop-prevention
    port-security 40 learn-mode limited-continuous
    port-security 40 address-limit 3
    port-security 40 action send-alarm
    no port-security 41 eavesdrop-prevention
    port-security 41 learn-mode limited-continuous
    port-security 41 address-limit 3
    port-security 41 action send-alarm
    no port-security 42 eavesdrop-prevention
    port-security 42 learn-mode limited-continuous
    port-security 42 address-limit 3
    port-security 42 action send-alarm
    no port-security 43 eavesdrop-prevention
    port-security 43 learn-mode limited-continuous
    port-security 43 address-limit 3
    port-security 43 action send-alarm
    qos dscp-map 8 priority 0
    qos dscp-map 9 priority 0
    qos dscp-map 10 priority 0
    qos dscp-map 11 priority 0
    qos dscp-map 12 priority 0
    qos dscp-map 13 priority 0
    qos dscp-map 14 priority 0
    qos dscp-map 15 priority 0
    qos dscp-map 16 priority 0
    qos dscp-map 17 priority 0
    qos dscp-map 19 priority 0
    qos dscp-map 21 priority 0
    qos dscp-map 22 priority 0
    qos dscp-map 23 priority 0
    qos dscp-map 24 priority 0
    qos dscp-map 25 priority 0
    qos dscp-map 26 priority 0
    qos dscp-map 27 priority 0
    qos dscp-map 28 priority 0
    qos dscp-map 29 priority 0
    qos dscp-map 30 priority 0
    qos dscp-map 31 priority 0
    qos dscp-map 32 priority 0
    qos dscp-map 33 priority 0
    qos dscp-map 34 priority 0
    qos dscp-map 35 priority 0
    qos dscp-map 36 priority 0
    qos dscp-map 37 priority 0
    qos dscp-map 38 priority 0
    qos dscp-map 39 priority 0
    qos dscp-map 41 priority 0
    qos dscp-map 42 priority 0
    qos dscp-map 43 priority 0
    qos dscp-map 44 priority 0
    qos dscp-map 45 priority 0
    qos dscp-map 47 priority 0
    qos dscp-map 48 priority 0
    qos dscp-map 49 priority 0
    qos dscp-map 50 priority 0
    qos dscp-map 51 priority 0
    qos dscp-map 52 priority 0
    qos dscp-map 53 priority 0
    qos dscp-map 54 priority 0
    qos dscp-map 55 priority 0
    qos tcp-port ipv4 20 dscp 56
    qos tcp-port ipv4 21 dscp 56
    qos tcp-port ipv4 23 dscp 56
    qos tcp-port ipv4 22 dscp 56
    qos udp-port ipv4 161 dscp 56
    qos udp-port ipv4 162 dscp 56
    qos tcp-port ipv4 49 dscp 56
    qos udp-port ipv4 69 dscp 56
    sflow 1 destination 10.0.10.100
    timesync ntp
    no sntp
    ntp unicast
    ntp server 10.0.20.11
    ntp server 10.0.20.12
    ntp server 150.151.152.153
    ntp server 154.155.156.157
    ntp server 192.168.220.175
    ntp server 192.168.220.176
    ntp server 213.251.52.234
    ntp enable
    time daylight-time-rule western-europe
    time timezone 60
    no web-management
    ip default-gateway 10.0.10.1
    ip route 0.0.0.0 0.0.0.0 10.0.10.1
    interface 1
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 2
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 3
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 4
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 5
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 6
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 7
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 8
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 9
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 10
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 11
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 12
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 13
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 14
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 15
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 16
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 17
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 18
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 19
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 20
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 21
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 22
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 23
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 24
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 25
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 26
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 27
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 28
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 29
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 30
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 31
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 32
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 33
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 34
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 35
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 36
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 37
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 38
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 39
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 40
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 41
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 42
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 43
       qos trust dot1p
       no bandwidth-min output
       rate-limit bcast in percent 3
       rate-limit mcast in percent 3
       exit
    interface 47
       name "WiFi-Publica"
       exit
    interface 48
       name "WiFi-INterna"
       exit
    interface Trk1
       qos trust dscp
       exit
    snmp-server community "public" unrestricted
    no snmp-server enable traps link-change 1-24
    snmpv3 enable
    snmpv3 user "initial"
    vlan 1
       name "DEFAULT_VLAN"
       no untagged 1-48
       untagged Trk1-Trk2
       no ip address
       exit
    vlan 10
       name "Gestion_Ayuntamiento"
       tagged Trk1-Trk2
       ip address 10.0.10.216 255.255.255.0
       exit
    vlan 21
       name "Telefonia_IP"
       tagged 1-35,Trk1-Trk2
       no ip address
       qos dscp ef
       exit
    vlan 25
       name "WiFi-Publica"
       untagged 47
       tagged Trk1-Trk2
       no ip address
       exit
    vlan 70
       name "Gestion_Telefonica"
       tagged Trk1-Trk2
       ip address 10.0.70.16 255.255.255.0
       exit
    vlan 80
       name "Impresoras"
       untagged 36-43
       tagged Trk1-Trk2
       no ip address
       exit
    vlan 90
       name "Videovigilancia"
       tagged Trk1-Trk2
       no ip address
       exit
    vlan 200
       name "Gestion_Meraki"
       untagged 44-46
       tagged Trk1-Trk2
       no ip address
       exit
    vlan 410
       name "Datos_Usuarios"
       untagged 1-35
       tagged Trk1-Trk2
       no ip address
       qos dscp 0
       exit
    vlan 420
       name "WiFi_Usuarios"
       tagged 44-46,Trk1-Trk2
       no ip address
       exit
    vlan 430
       name "WiFi_Invitados"
       tagged 44-46,Trk1-Trk2
       no ip address
       exit
    vlan 3150
       name "WiFi-Interna"
       untagged 48
       tagged Trk1-Trk2
       no ip address
       exit
    spanning-tree
    spanning-tree 1 bpdu-protection
    spanning-tree 2 bpdu-protection
    spanning-tree 3 bpdu-protection
    spanning-tree 4 bpdu-protection
    spanning-tree 5 bpdu-protection
    spanning-tree 6 bpdu-protection
    spanning-tree 7 bpdu-protection
    spanning-tree 8 bpdu-protection
    spanning-tree 9 bpdu-protection
    spanning-tree 10 bpdu-protection
    spanning-tree 11 bpdu-protection
    spanning-tree 12 bpdu-protection
    spanning-tree 13 bpdu-protection
    spanning-tree 14 bpdu-protection
    spanning-tree 15 bpdu-protection
    spanning-tree 16 bpdu-protection
    spanning-tree 17 bpdu-protection
    spanning-tree 18 bpdu-protection
    spanning-tree 19 bpdu-protection
    spanning-tree 20 bpdu-protection
    spanning-tree 21 bpdu-protection
    spanning-tree 22 bpdu-protection
    spanning-tree 23 bpdu-protection
    spanning-tree 24 bpdu-protection
    spanning-tree 25 bpdu-protection
    spanning-tree 26 bpdu-protection
    spanning-tree 27 bpdu-protection
    spanning-tree 28 bpdu-protection
    spanning-tree 29 bpdu-protection
    spanning-tree 30 bpdu-protection
    spanning-tree 31 bpdu-protection
    spanning-tree 32 bpdu-protection
    spanning-tree 33 bpdu-protection
    spanning-tree 34 bpdu-protection
    spanning-tree 35 bpdu-protection
    spanning-tree 36 bpdu-protection
    spanning-tree 37 bpdu-protection
    spanning-tree 38 bpdu-protection
    spanning-tree 39 bpdu-protection
    spanning-tree 40 bpdu-protection
    spanning-tree 41 bpdu-protection
    spanning-tree 42 bpdu-protection
    spanning-tree 43 bpdu-protection
    spanning-tree Trk1 priority 4
    spanning-tree Trk2 priority 5
    spanning-tree mode rapid-pvst
    spanning-tree priority 6
    no tftp server
    no autorun
    no dhcp config-file-update
    no dhcp image-file-update
    no dhcp tr69-acs-url
    password manager

     

     

     



  • 6.  RE: Problem with LACP between two Switches...

    Posted Sep 17, 2018 10:18 AM

    But is the port (52) UP between the 2 access switches right now? Because it seems it is not, from what i have seen.

    So if that is the case and you disable LACP  on that port it will not have impact.

     



  • 7.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 02:00 AM

    Hi (again),

    The Port 52/ TRK2 is down 'cause is being blocked by the LACP.  You can see this on this LOG:

    XXXXXXXXXX_2# sh log | i 52
    I 09/17/18 12:12:02 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:02 00076 ports: port 52 in Trk2 is now on-line
    I 09/17/18 12:12:03 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:12:16 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:17 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:12:42 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:12:42 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:15:32 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:15:32 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:26:21 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:26:21 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:29:25 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:29:26 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:34:09 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:34:09 00077 ports: port 52 in Trk2 is now off-line
    I 09/17/18 12:41:07 00435 ports: port 52 is Blocked by LACP
    I 09/17/18 12:41:07 00077 ports: port 52 in Trk2 is now off-line



  • 8.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 04:21 AM

    Yes i know, so in my opinion when you disable LACP on that port it can only be better right?

    I dont see a reason why you would lose the connection to your remote side. maybe a little STP topology change but that will be all.

    But better safe then sorry, so it is always better to have someone on side  i guess :)



  • 9.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 05:35 AM

    I'll try it on this afternoon.... MOde: Crossin' fingers :)

     

    Thanks 4 your support buddy....



  • 10.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 08:33 AM

    LACP is OUT but nothing has changed.... :(

     SS1.jpgSS1-2.jpgSS2.jpgSS2-2.jpg

    The port is flapping but isn't blocked by the STP or something....  Should not it appear as BLOCKED?

     



  • 11.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 08:50 AM

    Do you see errors on the port?

    Show interface 52



  • 12.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 09:04 AM

    Was my first check (**bleep**ing Monomode Fiber cable) but the answer is NO :'(

    SS1.jpgSS2.jpg

    Same type of SFP in both sides.

     

     



  • 13.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 09:13 AM

    Seems all OK to me. Don't know if you have spare switches available to see what happens when you connect a factory default switch on that port. Or you can also try to use another port.

    But i am running out of ideas :) maybe somone else on this forum can help you out.



  • 14.  RE: Problem with LACP between two Switches...

    Posted Sep 18, 2018 09:19 AM

    Thanks for all buddy!!! Your indications were very helpful.!!!

    I'll open a case with the manufacturer or I'll pray ... (Although I'm afraid there will not be Option B because I'm not religious) :P



  • 15.  RE: Problem with LACP between two Switches...

    Posted Sep 19, 2018 12:52 PM

    The traffic is nfs mounts for virtual machines, with a small possibility of iscsi.